Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59810: Information disclosure in Fortinet FortiSOAR on-premise

0
Medium
VulnerabilityCVE-2025-59810cvecve-2025-59810
Published: Tue Dec 09 2025 (12/09/2025, 17:19:06 UTC)
Source: CVE Database V5
Vendor/Project: Fortinet
Product: FortiSOAR on-premise

Description

An improper access control vulnerability in Fortinet FortiSOAR PaaS 7.6.0 through 7.6.2, FortiSOAR PaaS 7.5.0 through 7.5.1, FortiSOAR PaaS 7.4 all versions, FortiSOAR PaaS 7.3 all versions, FortiSOAR on-premise 7.6.0 through 7.6.2, FortiSOAR on-premise 7.5.0 through 7.5.1, FortiSOAR on-premise 7.4 all versions, FortiSOAR on-premise 7.3 all versions may allow information disclosure to an authenticated attacker via crafted requests

AI-Powered Analysis

AILast updated: 01/14/2026, 14:49:57 UTC

Technical Analysis

CVE-2025-59810 is a medium-severity vulnerability identified in Fortinet FortiSOAR versions 7.3.0 through 7.6.2, including both on-premise and PaaS deployments. The root cause is improper access control mechanisms within the FortiSOAR platform, which allow an attacker with valid authentication credentials but limited privileges to craft specific requests that bypass intended access restrictions. This results in unauthorized disclosure of sensitive information, potentially including security incident data, configuration details, or other confidential operational information managed by FortiSOAR. The vulnerability does not affect system integrity or availability but poses a significant confidentiality risk. The CVSS vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low complexity, requires privileges but no user interaction, and impacts confidentiality at a high level. FortiSOAR is widely used for security orchestration, automation, and response (SOAR), making this vulnerability particularly concerning as it could expose sensitive security workflows and data to unauthorized internal users or compromised accounts. No public exploits have been reported yet, but the presence of this flaw necessitates prompt remediation to prevent potential exploitation by threat actors who gain authenticated access.

Potential Impact

For European organizations, the impact of CVE-2025-59810 can be significant due to the sensitive nature of data handled by FortiSOAR platforms, including security incident details, automated response playbooks, and integration credentials. Unauthorized disclosure could lead to exposure of internal security processes, aiding attackers in evading detection or escalating attacks. Confidentiality breaches may also violate data protection regulations such as GDPR, resulting in legal and financial repercussions. Organizations in critical sectors like finance, energy, telecommunications, and government are particularly vulnerable because they rely heavily on SOAR platforms for incident management and rapid response. The medium severity rating reflects the absence of direct system compromise or denial of service but highlights the risk of internal data leakage. Since exploitation requires authentication, the threat is primarily from malicious insiders or attackers who have compromised legitimate user credentials. The lack of known exploits in the wild provides a window for proactive defense but should not lead to complacency.

Mitigation Recommendations

1. Apply official patches or updates from Fortinet as soon as they become available to address the improper access control issue. 2. Restrict FortiSOAR access to trusted networks and enforce strict access controls, including network segmentation and VPN requirements. 3. Implement strong multi-factor authentication (MFA) for all FortiSOAR user accounts to reduce the risk of credential compromise. 4. Regularly audit user permissions and remove unnecessary privileges to minimize the attack surface for authenticated users. 5. Monitor FortiSOAR logs for unusual authenticated request patterns that could indicate exploitation attempts. 6. Employ anomaly detection tools to identify suspicious internal activity related to FortiSOAR access. 7. Educate security teams about the vulnerability and ensure incident response plans include steps for potential information disclosure scenarios. 8. Consider temporary compensating controls such as disabling non-essential features or interfaces until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fortinet
Date Reserved
2025-09-22T08:19:21.055Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69385e4e74ebaa3baba142a6

Added to database: 12/9/2025, 5:37:18 PM

Last enriched: 1/14/2026, 2:49:57 PM

Last updated: 2/6/2026, 9:37:08 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats